UPENDER REDDY
**********@*****.***
LinkedIn : https://www.linkedin.com/in/upender-reddy-dasireddy
Mob: 334-***-****
PROFESSIONAL SUMMARY NETWORK ENGINEER:
•Strategic professional with 5+ years of experience operating data communications systems and developing business solutions. Manages high-quality ICT and Internet solutions and has in-depth knowledge of Cisco hardware and data management.
•Experience of data center environment and implementation of VPC, VDC and Fabric path on Nexus 7K, 5K, & 2K Switches.
•Working experience on various vendors' firewalls, including Palo Alto PA-5220, PA220 &Panorama and Cisco ASA 5585-X.
•Given support for RADIUS and TACACS+ servers for network device access control.
•Implemented Cisco ISE for delivering consistent, highly secure access control across wired and wireless multivendor networks and remote VPN connections
•Experience with different Network Management Tools and Sniffers like Wireshark, HPOpen view, RSA envision, and Cisco works to support 24 x 7 Network Operation Center.
•Experience with zscaler cloud proxy Architecture with ZIA, traffic forwarding using GRE tunnels to Zcolud, Azure AD Authentication, Access policies,ZAPP. Experience migration from Ironport’s and bluecoat proxies to Zscaler
•Hands-on experience with WAN (MPLS, ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.
•Setup, Configured and managed zscaler internet Access deployment, Zscaler Private internet access and Netskope DLP security platform CASB.
•Document NMS application process flow administration perform NMS application installations and configurations.
•Perform operational testing of NMS application transition.
•Assess NMS program state, correct any identified issues, recommend any identified optimization or enhancements perform application system file configuration changes work with confidential tools product developers to troubleshoot and debug code issue for customer isuues.
•Implemented EMS Utilizing protocols used to support management are SNMP, JMX.
•Utilized EMS to identify and solve all operational problems and issues
•Hands on experience in troubleshooting and deploying of various IP Routing Protocols like EIGRP, OSPF & BGP.
•Upgraded VCenter and ESXi to 5.5 using VMware Update manager and manual upgrades.
•Working experience in AWS EC2 and VPC.
•Ability to manage all phases of network installation and administration.
•Experience with Change management, Project documentation & implementing and maintaining network monitoring systems and experience with developing network design documentation and adept in preparing Technical Documentation, MOPS and presentations using Microsoft VISIO/Office.
•Extensive knowledge of deploying & troubleshooting TCP/IP, Implementing IPv6, Transition from IPv4 to IPv6, Multilayer Switching, UDP, Fast Ethernet, Gigabit Ethernet, Voice/Data Integration techniques.
•Well organized, Self-starter, Quick learner, Self-Motivated, Team player with analytical, technical and communication skills.
Education:
Master of Science in Computer Science
Auburn university at Montgomery, Montgomery, Alabama, US
Year of Graduation – 2022
Technical Skills:
Windows Cisco Firewall Wireless MPLS BGP OSPF with a CCNP Network Systems Installation Cloud Management Network Security Oversight Interpersonal Skills Critical Thinking Network Repairs and Maintenance Troubleshooting Data Backups Security System Upgrades
Routing
Technology
IGRP, EIGRP, IS-IS, OSPF, BGP.
Network Products
CISCO Routers 1921, 1941, 2900, ISR 4461, NCS 520. CISCO Catalyst Switches 2960, 3560, 3650, 3750, 3850, 9200, 9300 and ASR 1k, 9k Core Catalyst 4503, 4507 RE, 6500/6503/6507, Nexus 2K, 5K, 7K series
Security & VPN
Cisco ASA 5580,5585-X Firepower, Palo-Alto PA 5220, Cisco Any connect-VPN, Global Protect-VPN, ACL-Access Control List, IPS/IDS, NAT, PAT, Cisco ISE.
Operating
Systems & Tools
Cisco IOS, Cat-OS, Windows 2000/2003/2008 Server, Windows XP/Windows 7/8,10, Active Directory, NX-OS, PAN-OS
Load balancers
F5 Big IP LTM - Viprion 2000 series,3000 series, Citrix Netscaler MPX series, Zcsaler
Management
tools
SNMP, Syslog, Sniffer, Netflow, and Wire shark, Cisco Prime, Solar winds Orion, NetBrain
Cable
Management
Cat 6, 5e, 5, Single/Multi Mode Fiber (1G, 10G), Fiber Connector types SC, LC, FC, and CWDM/DWDM Fiber Multiplexers.
PROFESSIONAL EXPERIENCE:
AbbVie, Chicago, IL September 25, 2023-Present
Network Engineer
Responsibilities:
•Troubleshot network issues related to BGP and OSPF, ensuring seamless network connectivity.
•configuring and maintaining routing policies using BGP and OSPF across multiple enterprise WAN sites.
•
•Worked with application teams to fine-tune load balancing algorithms Round Robin, Least Connections etc. for optimal performance.
•Implemented SSL offloading and certificate management on F5 BIG-IP to enhance application performance and simplify backend security.
•Configured DNS load balancing (GTM/DNS Services) for global traffic distribution across geographically dispersed data centres
•firmware upgrades and configuration backups on F5 BIG-IP systems in a controlled, change-managed environment
•Managed and performed IOS upgrades on Cisco Catalyst 3650, 3850, 9300, 4500, and 9500 Series switches, including manual IOS upgrades on devices running legacy Ver 3.0.6.
•Resolved endpoint tracker problems and collaborated with vendors to execute cable inspections on Cisco Catalyst 8000 Series SD-WAN routers, guaranteeing reliable connectivity and peak network performance.
•Engaged Cisco vendor teams to address high CPU utilization on SD-WAN routers, reducing system strain and improving network stability.
•Deployed secure access configurations, including AAA, SSH, and TACACS+, across Cisco Nexus 7k,9k series and Catalyst 3000/9000 series platforms.
•Implemented VLANs and interface-level settings on Cisco Catalyst and Nexus devices for optimized network performance and structure.
•Resolved switch issues in ROMMON mode during IOS upgrades, ensuring devices were fully operational.
•Installed, racked, and stacked Cisco 3850, 9300, 9500, and Nexus 9k series switches in communication rooms and data centres, contributing to infrastructure expansion.
•Managed interior and exterior network devices within the data center, ensuring smooth operations and performance.
•Utilized SolarWinds, Splunk, NetScout and IPAM for the device performance monitoring, identifying and resolving network bottlenecks and potential failures.
•Restored passwords and remote access on Cisco 3850, 9300, 9500, and Nexus 7k,9k series devices during the upgradation configuration loss, ensuring quick recovery and minimal downtime.
•Troubleshoot Cisco 9130 Series Access Points when unable to obtain an IP address, ensuring access points functioned properly in network environments.
•Configured Cisco 9300 Series switches both manually and through Cisco DNAC, ensuring optimal device settings and network performance.
•Successfully upgraded and maintained critical network devices, enhancing overall network reliability and uptime.
•Played a key role in the expansion and modernization of AbbVie’s network infrastructure within the data centre.
•Proactively resolved complex issues in high-pressure environments, reducing network downtime and improving overall service delivery.
•Upgraded the Nexus 5k,7k and 9k devices manually as per the Cisco recommended version.
•Configure and troubleshooted the VPC on the Nexus 7k and 9k devices.
•Coordinated with vendors to manage warranty and support contracts for Cisco equipment, ensuring timely replacements and minimizing potential downtime.
•Configured and managed network switches, including moving ports between VLANs on existing switches to optimize network performance and meet business requirements.
•Provided on-call support for P1/P2 incidents, ensuring timely resolution of high-priority tickets and minimizing service disruptions.
•Troubleshot network issues and ensured smooth communication between MCN 3650 switches, 4500 Catalyst switches, and 4500 Aggregation switches, improving overall network stability.
•Collaborated with VMware and Windows teams to resolve cross-platform network issues, contributing to the overall efficiency and stability of the enterprise network.
Vanguard, Los, CA December 2022 – September 2023 Network Security Engineer
Responsibilities
•Configuring, Administering and troubleshooting the Site-to-Site VPNs on CISCO ASA and Firepower environments.
•Implemented Site-to-Site VPNs over the internet utilizing security standards such as 3DES, AES/AES-256 with ASA 5580, FPR 2130 Firewalls.
•Configured Access List (Standard, Extended, and Named) to allow users all over the company to access different applications and block others
•Experience with migrating the Partner IPSEC VPN tunnels from one data center to another.
•Supporting the deployment of Dynamic Multipoint VPN.
•Supporting the migration for Cisco ISE to 3.0.
•Hands-on experience with issues related to security like NAT, IP sec, ACLs
•Extensively worked on TCP/IP protocols and transport protocols like TCP and UDP.
•Configuring Policy sets, policies and profiles on Cisco ISE for Authentication and Authorization of network devices.
•Configuring users' roles and policies for authentication using Cisco NAC and monitoring the status of logged users in the network using Cisco ISE.
•Responsible for troubleshooting on Cisco ISE added new devices on the network based on policies on ISE.
•Working on Cisco Routers and Switches and Wireless networks 802.11a/n at an Enterprise level.
•Hands-on experience with Supporting Deployment on Pulse Secure VPN, Palo Alto Global Protect VPN.
•Performed IOS upgrades/Password recovery on 2900, 3500 series Cisco Catalyst switches and 1800, 2600, 3600 series Cisco routers using TFTP.
•Implemented the Policy Rules on a Multi Context Cisco ASA firewall in DMZ Zone.
•. Experience migration of IPSEC VPN tunnels to better encryption standards.
•Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500 with ACL, NAT, Object Groups, Failover, Multi-Contexts.
•Configuring, Administering, and troubleshooting SNMP in Cisco ASA 5525, 5555, 5585 and Firepower 2130, 4120, 9300 firewalls.
•Configuring STP for switching loop prevention and VLANs for data and voice along with configuring port security for users connecting to the switches.
•Coordinating the Deployment of HL7 Interface with the Application team.
•Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls.
•Configured and maintained IPSEC and SSL VPNs on Cisco ASA 5500 and Firepower 2130 Firewalls.
•ASA/FPR firewall Log Maintenance and Policy Maintenance. Troubleshooting complex Checkpoint issues, Site-to-Site VPN related.
•Supporting the deployment on CISCO ACI.
•Utilization of Firemon application to simplify the ACL, NAT policies.
•Familiar with Networking tools like CISCO IOS, Wireshark, Ping, Traceroute, Speed Test.
•Supporting Installation and configuration of CISCO ASA and Firepower firewalls.
•Implementing, Administering, and troubleshooting TCP/Bypass and Fast path traffic on the Cisco Firepower firewall
Trizetto, Englewood, CO. November 2021 - December 2022 Network Engineer
Responsibilities:
•Developed a Testing lab as replica to client network systems, performing feature testing, Negative testing and software upgrades on all the devices like ASR 9K, Nexus 7K,6K,3K and other catalyst devices like 6880 and 3750X Using SPIRENT as traffic generator.
•Evaluate local area network (LAN) or wide area network (WAN) performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes.
•Attend new project meeting and understanding the client requirements for network connectivity at new buildings and data centers, or at sites where networks are being enhanced or upgraded.
•Implementation of network projects by managing installations, configuration of network devices in lab environment. Preparing change implementation plans, test plans based on customer requirements.
•Implemented and troubleshoot LAN and WAN technologies (Frame Relay, DSL, ATM, POS, MPLS)
•Hands-on experience with WAN (MPLS, ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.
•Recommending new IOS versions to the current existing EOL IOS in particular devices in client environment based on the Lab testing.
•Verifying Bugs in current IOS in Customer environment and need to recommend appropriate IOS to the clients based on the testing in the Lab environment for the respective devices.
Hands-On experience, with Lab recreate of customer’s environment, with detailed feature testing on multiple Cisco devices and Line-cards, documentation of analysis/findings and formal presentation to the customer’s technical leaders.
•Configuring and troubleshooting layer 3 routing protocols such as EIGRP, OSPF, RIP, BGP; and High Availability on Cisco devices.
•Updated Fortinet firewall with option 150 scripts to allow DHCP and configurations for the Cisco IP Phones.
•Configure and implement Resource Pools, VMware Clusters, HA, DRS, Patch Management using VUM in high-end ESX environments.
•Upgraded VCenter and ESXi to 5.5 using VMware Update manager and manual upgrades.
•Configuration of vPC, vPC+ and Fabricpath on Nexus 3K/5K/7K and 9K.
•Deployed and configured Catalyst 6500,3850,3750-X and 3750 switches
•Deployed and configured Cisco ASR 1000 and 9000 series routers.
•Experience in working and designing configurations for vPC, vPC domain, vPC peergateway, vPC peer-switch, auto-discovery, vPC single sided, vPC double sided, NX-OS and fabric path.
•Deployed advanced features like vPC, VDC, Fabricpath, OTV in Nexus and VSS in catalyst 6800.
•Validation of latest IOS on LAB before implementing in customer locations.
•Involved in the configuration & troubleshooting of routing protocols: BGP, OSPF, and EIGRP.
•Involved in the configuration & troubleshooting of Layer 2 protocols: Vlan database STP, Etherchannel, Layer-2 security etc.
•Involved in the configuration & troubleshooting of VSS and switch stacking configurations.
•Configured and implemented ISR, ASR Routers, Catalyst 3850, 3750X, 6800-VSS in lab environment.
•Lab and Site deployment of Network Data Infrastructure includes (Cisco ASR and ISR routers, Cisco 6800-VSS and 3750X and 3850 Switches)
•Design and documentation of Entire test plan (including test cases) based on the customer network topologies in test lab environment.
•Key contributions include troubleshooting of LAN/WAN infrastructure related issues in customer environment.
•Translating Cisco IOS Route maps to Cisco IOS XR routing policies
•Working with Cisco Nexus 2148 Fabric Extender and Nexus 5500 series to provide a Flexible Access Solution for datacenter access architecture.
•Deployed Palo Alto Networks PAN-5050.
•Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning and configuring VLANs/routing/NATing with the firewalls as per the design
•Converting Cisco IOS to Cisco IOS XR configurations, Configuring BGP, MPLS in Cisco IOS XR
•Configuring Virtual Device Context in Nexus 7010, Working with CISCO Nexus 7000, Nexus 5000, and Nexus 2000 platforms
Working with BGP, OSPF protocols in MPLS Cloud, Hands-on experience with iBGP & EBG.
Syniverse, Hyderabad, India May 2019 - July 2021
Network Engineer/Operations Engineer
Responsibilities:
•Handling Clients VPN connections, establish new connections and troubleshoot.
•Jump on to Hotline SEV1 calls to make sure all clients are up and running globally
•Supported core network consisting of Cisco 7200 series routers running multi area OSP
•Configuration of EIGRP and BGP to Telco peers
•Configuring/Troubleshoot issues with the following types of routers Cisco (1700, 2600 and 3500 series), to include: bridging, switching, routing, Ethernet, NAT, and DHCP, as well as assisting with customer LAN /MAN, router/firewalls.
•Configuring network interfaces, static routes, and NAT rules in panorama and thereafter pushing to individual Palo Alto devices.
•Multi VRF based PBR routed production environment and VDC based routing on Nexus.
•Configure and support Nexus 5548, 5596, 5010, 2020 and 9372 switches in a Fex based architecture
•Worked on Network configuration manager projects like Solar Winds NCM and Puppet server client connection deployment
•Upgrade Nexus switches 5k access layer switches from os version 5.2 to 7.0 as per company standards and cisco recommendation to address some software bugs
•Designed, implemented, configured, and supported F5 BigIP, Ltm, 3Dns and Gtm local and global load balancing appliances in a highly demanding environment.
•Configure and maintain various F5 load balancer modules like BIG IP 3900 GTM, BIG IP PB200, BIG IP 8900, BIG-IP 4200 and F5 enterprise manager.
•Configuration and set up of Juniper SRX firewalls for policy mgmt. and VPN's
•Provided firewall policy configuration and services with Juniper SRX 240 & 650 service gateways
•Performing the software upgrade from version 7 to 8.0.2 on panorama and VM-300 series Palo Alto firewalls.
•Provided Layer-2 support by troubleshooting issues related to HSRP, VLANs, VTP, STP, RSTP, MST, TRUNKING, SPAN and RSPAN, in our DATA center and CAMPUS environments.
•Responsible for All firewall requests and approve them according to standards and push them through NSM (junOS and Netscreen), CSM (cisco) and SMART DASHBOARD (check point.
•Experience in Datacenter Technologies and Tier 3/ Tier 4 solutions
•Extensively worked on Nexus family for (ToR) Top of Rack and tier3/tier4 architecture using Nexus 5K and N2K
•Data center Tier 3 and tier 4 Architecture experience to provide 99.985 and 99.995 % availability to the data center
•Experienced with configuration and maintaining of Palo Alto and Cisco ASA firewall.
•Skilled with configuration and implementation of NAT, Security Polices on Palo Alto (PA-5250, PA-3060) firewalls.
•Worked on implemented Active/ Standby HA configuration on Palo Alto Firewalls.
•Provide presentations explaining findings for client management and engineers.
•Collaborate with clients to create network engineering solutions from concept to deployment.
•Help in the creation of precise network designs for software defined networking, network segmentation, network access control, network security, and cloud networking components.
•Assess new network technology and make recommendations.
•Conduct internal and external meetings, as well as produce reports and presentations.